Aircrack-Tutorial/WPA mit Client

Vorwort Dieses Tutorial soll keine Anleitung sein um mutwillig & illegal in fremde Netzwerke einzudringen. Es ist ausschließlich dazu gedacht, die Sicherheit von WPA-gesicherten Drahtlosnetzwerken zu überprüfen, sofern die Legitimation, durch Besitz oder Erlaubnis des Eigentümers, dazu bestehen. Inhaltsverzeichnis 1 Voraussetzungen 2 Vorbereitung 3 Start 3.1 WLAN-Interface ausrichten 3.2 Airodump-ng 3.3 Aireplay-ng 3.4 Aircrack-ng 3.5 Fazit Voraussetzungen Da auf dieses Thema (im Moment) nicht weiter eingegangen werden soll, sind die Voraussetzungen um dieses Tut durchführen zu können, wie folgt:

Continue reading

Cheatsheet tmux

reaver-wps Brute force attack against Wifi Protected Setup – Cracking Wifi WPA/WPA2 passwords using Reaver-WPS  Overview: Reaver-wps performs a brute force attack against an access point’s WiFi Protected Setup pin number. Once the WPS pin is found, the WPA PSK can be recovered and alternately the AP’s wireless settings can be reconfigured. This post outlines the steps and command that helps cracking Wifi WPA/WPA2 passwords using Reaver-WPS. While Reaver-wps does not support reconfiguring the AP, this can be accomplished with wpa\supplicant once the WPS pin is known.

Continue reading

Cracking WPA2 WPA with Hashcat in Kali Linux (BruteForce MASK based attack on Wifi passwords)

cudaHashcat or oclHashcat or Hashcat on Kali Linux got built-in capabilities to attack and decrypt or Cracking WPA2 WPA with Hashcat – handshake .cap files. Only constraint is, you need to convert a .cap file to a .hccap file format. This is rather easy. Hashcat Hashcat is the self-proclaimed world’s fastest CPU-based password recovery tool. It is available free of charge, although it has a proprietary codebase. Versions are available for Linux, OSX, and Windows and can come in CPU-based or GPU-based variants.

Continue reading